ConsenSys, the developer behind MetaMask, isn’t the only one snooping on our transactions, but they’ve taken the most heat for it.
There is a tendency in the digital money world to focus on a new problem every few weeks and then quickly forget it. This group of people have limited attention span and miss the final solution of important problems. On Mother's Day in November 2022, Consensys released a privacy policy that severely affected MetaMASK users and plunged Crypto Twitter into a hurricane. My first reaction was negative.
The MetaMASK browser extends Wallet to apply a node called InFura. The user of this node is Consensys, which is actually the enterprise that develops and designs MetaMASK. News articles prompt users that InFura collects Internet Protocol (IP) address information about the wallet details of users who deliver their MetaMask wallets to InFura. It also reminds them that MetaMASK users do not need to apply InFura, which is just a default, and MetaMask allows delivery to other public node service providers, such as AlChemy or Ankr.
If you push or accept data encryption, your wallet interacts with blockchain technology. But wallets are not easy to download blockchain technology for free; it's too hard for wallets on phones. Conversely, when your data encryption wallet pushes the transaction, most wallets use public nodes to require that the sale be imported into the blockchain technology according to the memory pool.
(you can set your own nodes. In fact, you might want to do this for better privacy and speed. More private nodes mean a more fragmented Internet. But I've already tried, but I don't have the skills to do it. Maybe you'll get better luck.)
Now, let's remember that blockchain technology like Etay Fong is not private. If you want personal privacy, you need to use a personal coin such as Monero (XMR), which will reveal some information about the publisher, or ZCash (ZEC) will block trading transactions and will not disclose the publisher's information. Maybe you need a personal privacy tool, but unfortunately, the US federal government has approved Tornado Cash, which is also the most valuable privacy protection tool in Ethernet Fong.
In any case, if you apply public nodes or any other intermediate service items to buy and sell transactions using encryption algorithms, you need to use a virtual private network (VPN) or ToR (easy to use with Tor computer browsers) to subnet mask your Internet technology service provider (ISP) detailed address. Will someone use Ledger Live to apply your Ledger hardware configuration to carry out data encryption transactions? Ledger Live also tracks Internet technology service providers and apparently stores this information for nearly five years.
Personal privacy is a person's duty. No one can maintain it for you. Login password users must learn to use VPN, Tor, personal privacy coins and other privacy-specific tools. The day will soon come when the government sends a full range of "anonymous court subpoenas" to the public node service provider to obtain the Internet technology service provider, as the Internal Revenue Service (IRS) did to the intermediate login password trading center in the early days of the login password. This intermediary service will no doubt follow.
There is a formal basis that the remote procedure call service provider may also need to save ISP information. As Infua customers, some node users are likely to look forward to tracking Internet technology service providers, because this can help catch network hackers.
So, back to this: are we still mad at MetaMASK? The little fox is famous for his intelligence. But, what is not known is that they are also loyal, because both males and females pay close attention to the modules in the home. Is it the genius of the MetaMASK fox, or the core principle of the loyalty blockchain?
Causing public outrage refers to the public disclosure of a change in his privacy policy. Clarity is a good thing-or should be, unless Crypto Twitter responds violently to such announcements. In response to the accusation, they further improved their privacy policy. Read the article yourself here for a new InFura privacy policy. It looks simple and tries to protect personal privacy in a relatively limited way.
InFura's competitors, such as alchemists and MyEtherWallet, took advantage of this opportunity to present a shadow to InFura. A MetaMASK real estate developer fought back. Read the article AlChemy's Privacy Policy, which applies legal terminology to preserve the right to collect and apply data information, no matter what AlChemy chooses. The alchemist's privacy policy has been strongly recommended by the Chainlist for its embarrassing privacy practices. It's not cool.
In the login password, as in daily life, personal privacy is a person's right and responsibility. Spending your mind on venting for a moment is not as good as learning and training personal privacy techniques to protect yourself.
J W Virete is an associate professor at the Antonin Scalia Law School at George Mason University. He is a practicing crypto forensic accountant and also practices securities law at Lawrence Law LLC. He is a member of the Financial Accounting Standards Board’s Advisory Council and a former SEC Investor Advisory Committee member. He also leads the Crypto Freedom Lab — a think tank fighting for policy change to preserve freedom and privacy for crypto developers and users.